CSO

CSO Daily

February 13, 2020

Image: The 25 worst passwords of 2019, and 8 tips for improving password security

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security. Read more ▶

Your Must-Read Stories

•

Cybersecurity spending trends, 2020

•

8 steps to being (almost) completely anonymous online

•

The CIA triad: Definition, components and examples

•

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

•

8 top OSINT tools: Find sensitive public info before hackers do

•

7 security incidents that cost CISOs their jobs

Video/Webcast: EMA Analyst Research

Navigating Modern Endpoint Management Complexities

This live webinar from EMA Research and Kaseya will deliver actionable guidance on how to navigate modern endpoint management challenges in order to simplify administration tasks, lower costs, improve end-user experiences, and meet organizational goals. Read more ▶

Image: Cybersecurity spending trends, 2020

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

 
 
Image: The CIA triad: Definition, components and examples

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure. Read more ▶

Image: More targeted, sophisticated and costly: Why ransomware might be your biggest threat

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes. Read more ▶

Image: 8 top OSINT tools: Find sensitive public info before hackers do

8 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Image: 7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity. Read more ▶

eBook: Zscaler

Redefining Secure Access to Private Applications

It's time for a new approach to application security. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com